AFDX/ARINC 664 Concept, Design, Implementation and Beyond
|
|
|
- Geoffrey Price
- 10 years ago
- Views:
Transcription
1 SYSGO White Paper White Paper AFDX/ARINC 664 Concept, Design, Implementation and Beyond By Detlev Schaadt, CTO, SYSGO AG
2 Whitepaper AFDX/ARINC 664 Concept, Design, Implementation and Beyond Introduction Avionic Full-Duplex Switched Ethernet (AFDX), designated ARINC 664, is a specification for a deterministic aircraft data network bus for aeronautical, railway and military systems. The network is based on standard IEEE Ethernet technology. The benefits from using commercial-off-the-shelf (COTS) Ethernet components include reduced overall costs, faster system development and less-costly maintenance for the system network. Hardware components, cables and test equipment for Ethernet are field proven and much more affordable than built-to-spec avionics solutions. Standard commercial grade Ethernet won t meet avionics network requirements. Therefore, AFDX extends the Ethernet standard by adding Quality of Service (QoS) and deterministic behavior with a guaranteed dedicated bandwidth. AFDX is currently used in the Airbus A380 and A400M as well as in the Boeing 787 Dreamliner. History of Avionic Data Busses Aircraft control systems generally consist of a number of sensors to read environmental or inertial data, an avionic system performing a certain flight relevant control function and outputs, for instance to control actuators to perform rudder or flap movements. There always has been a need to interconnect between these components and traditionally, a set of sensors and actuators have been connected to one avionics function. The main data busses used for these purposes where ARINC-429 and MIL-STD The following sections will give a brief overview of these technologies. ARINC-429 ARINC-429 is a two-wire data bus that is application-specific for commercial and transport aircraft. The connection wires are twisted pairs. Words are 32 bits in length and most messages consist of a single data word. The specification defines the electrical and data characteristics and protocols. ARINC 429 uses a unidirectional data bus standard (Tx and Rx are on separate ports) known as the Mark 33 Digital Information Transfer System (DITS). Messages are transmitted at either 12.5 or 100 Kbit/s to other system elements that are monitoring the bus messages. The transmitter is always transmitting either 32-bit data words or the NULL state. No more than 20 receivers can be connected to a single bus (wire pair). MIL-STD 1553 MIL-STD-1553 is military standard published by the United States Department of Defense (DoD) that defines the mechanical, electrical and functional characteristics of a serial data bus. It was originally designed for use with military avionics, but has also become commonly used in spacecraft on-board data handling (OBDH) subsystems, both military and civil. It features a dual redundant balanced line physical layer, a (differential) network interface, time division multiplexing, half-duplex command/response protocol and up to 31 remote terminals (devices). The communication speed rated up to 1 Mbit per second. All communication on the bus is initiated by the bus controller, which polls the remote terminals to send or receive data. It was first published as a U.S. Air Force standard in 1973, and was first used on the F-16 Fighting Falcon fighter aircraft. It is widely used now by all branches of the U.S. military and has been adopted by NATO as STANAG 3838 AVS. IMA requires new communication capabilities A number of innovations and changes are delivering new capabilities to aircraft operations. Modern aircrafts are equipped with numerous electronic components. Some of them like flight control and guidance systems provide flight critical functions, while others may provide assistance services that are not critical to maintain airworthiness, but reduce the workload of the crew. The amount of capabilities is increasing, and so is the amount of information that needs to be processed and displayed. The industry more and more requires a flexible and scalable standard architecture to support the broad spectrum of capabilities and performance with standardized interfaces to fit a wide range of aircrafts. Simultaneously a need exists to improve factors like system dispatchability, reliability and maintainability while at the same time reducing the physical dimensions of size, weight, number of connectors, etc. To reduce lifecycle and construction costs, the usage of common system building blocks with high levels of reuse is aimed at. Consequently, the aircraft manufacturers as well as the main function suppliers for avionic subsystems have been thinking about a new architecture for avionic systems, providing a standardized hosting platform for avionic applications. The idea of Integrated Modular Avionic (IMA) was born and it is quite simple: A general purpose computing platform provides the computational power The interfaces to sensors and actuators are standardized and provided on separate I/O boards The computing platform provides a real-time operating system (RTOS) with a standard interface (API) to avionic applications The IMA approach introduces a number of advantages over the traditional solutions, as resources can now be shared, computational power can be added to the system, if growth concepts requires additional performance. Standardized platform software provides standard functionality common to all subsystems, like maintenance functions, data loading functions, BITE, etc. The IMA concept goes as far as allowing multiple avionic applications to execute on one computing module in so called partitions. To retain fault containment within partition boundaries, the underlying operating system is required to provide strict partitioning of CPU-time and other resources, like memory, common I/O channels, or communication paths. While most of the avionic software applications still anticipate data communication and distribution over ARINC-429, a new network infrastructure was needed to reflect the new flexibility in aircraft system design and cope with the mere number of interconnections between avionic subsystems. 2
3 AFDX, the next generation avionic data network The solution to the new challenge is to use commercially proven hardware base technology and apply a protocol to it, capable of delivering the reliability in packet transport and timing. Asynchronous Full Duplex Switched Ethernet (AFDX) is based on standard IEEE /100 Mbit Ethernet hardware. This is a well known standard and it is widely used. The packets are enveloped as IP and UDP packets, a software protocol known from the internet. However, the base requirements for a network for avionics applications are not covered by standard technology: reliable packet transport bounded transport latency Special extensions to the network protocol and a fixed topology are needed to meet these requirements. The AFDX protocol has been standardized by an ARINC working group. ARINC-664 describes aircraft data networks (AND) and part 7 specifically deals with AFDX. Flexible Network Topology Normal Ethernet technology uses a topology where each node is treated equally. If a peer wants to transmit a packet on the network and the media is occupied, a collision occurs, the peer backs up and tries again, until the transmission is successful, or a predefined amount of time has elapsed. This behavior introduces variable length latency, which is not tolerable in safety critical applications. In order to avoid collisions on the network, a switched full duplex topology is introduced. Figure 1: AFDX Topology Overview Regular switches forward packets according to a connection table, which is build and updated while the switch is in operation; it learns and forgets about the peers connected to it. Of course, this technique is very appropriate in a network with temporary peers that attach and detach from the net. The process of learning however, introduces variable latency and has to be eliminated in an avionic data network. Consequently, an AFDX switch forwards packets according to a static table. This is, in fact, a general policy in this network to statically define all peers and their respective network addresses. There is no address resolution protocol (ARP) necessary to resolve MAC addresses from IP addresses. To increase availability of the network, it is build using redundancy on the physical layer. Each packet is transmitted simultaneously by two Ethernet controllers onto separate wires, via physically separate switches to the destination system. Figure 2: AFDX messages are sent redundant Here, two separate Ethernet controllers receive the frame and a redundancy management algorithm in the protocol layer forwards at most one of the two identical packets appropriately to upper layers. Physical redundancy can be configured on a per connection basis, allowing less data links with fewer requirements for availability to utilize the additional bandwidth offered by the second data link. Sub Systems, AFDX End Systems and Switches An AFDX network consists of so called End Systems and switches. An End System is a component connected to the AFDX network and capable of handling all AFDX related protocol operations. Usually, an End System is part of an avionic or aircraft subsystem, which needs to send or receive data over the AFDX network. One or more switches, depending on the network hierarchy, are located on the data path between two End Systems. In order to decouple transmit operation from data reception all data paths use separate data buffers, thus creating true full duplex data links between End Systems. While this enables data communication using full wire speed between End System end AFDX switch, it becomes obvious that the bottleneck appears at the connection between switches. Here, all traffic appears that has to leave the switch and the sum of the individual transmission rates may easily be larger than the capacity of the inter switch data link. It has been mentioned previously that AFDX at the application level is intended to replace ARINC-429 connections. With ARINC- 429 representing point-to-point or point-to-multipoint connections, it is not surprising, that AFDX has the same characteristics. The point-to-point and point-to-multipoint connections are represented by virtual links (VL). A single VL may connect exactly two End Systems, in which case it represents a point-to-point connection. It may also connect one sending End System with multiply reading End Systems, in which case it represents a point-to-multipoint (multicast) connection. The advantages of this architecture lie in the fact that AFDX presents itself compatible at the application level and saves a large amount of cable runs by multiplexing many individual VLs onto a single wire connection, utilizing the increased bandwidth of a 100Mbit Ethernet connection. The VL-bundle is demultiplexed at the destination switch and forwarded to the appropriate End Systems. Many protocol features that have been introduced to IP or even TCP layers have to do with the fact that a peer to peer connection via 3
4 Whitepaper AFDX/ARINC 664 Concept, Design, Implementation and Beyond Figure 3: AFDX Subsystem to Switch communication Internet is inherently unsafe. Often, the route between peers is not known up front, it may even change during the session. Large packets are fragmented and re-assembled on their way from sender to recipient and sometimes, packets are received out of order. An avionics real-time capable network like AFDX is not exposed to many of these scenarios. In principle, all network parameters are known and constant and the resulting IP layer can be a lean implementation, free of fallback and retry algorithms. Key parameters are the fact that packet fragmentation is indeed possible to allow for packets larger than the MTU at application level. However, the network guarantees all packets to be ordinal integer. Host Communication API In section 1 it was mentioned that the AFDX technology has to be viewed in the context of IMA technology. The industry has also standardized on an API for IMA Systems; the name of this standard is ARINC-653 APEX. This API defines so called Ports as only means for an application to exchange data with entities outside their own context. This entity may be a local device driver accessing local hardware, or an endpoint of a data channel to a remote computer. The advantages of such an approach are obvious: The application uses a unified API to exchange data. The Channel is configured independently from the Ports at the module integration level. Thus, a change in channel configuration is transparent to the application using the Port. The ARINC-653 APEX defines Queuing Ports and Sampling Ports. Queuing Ports A Queuing Port is message oriented; a queue with a preconfigured depth accepts messages until all space is occupied. Further attempts to place a message in the queue will result in the application to wait until there is room for data, if the Port operates in blocking mode. A single source Queuing Port can only connect to exactly one destination port (1:1 relation). Sampling Ports In principle, a Sampling Port is a Queuing Port with a queue depth of one message. Consequently, a new message overwrites an old message, if the message has not been consumed yet. The configuration allows specifying a so called refresh rate. The age of a message is compared against the refresh rate and depending on the result a read service call returns the data s validity. It is possible to connect one source port to multiple destination ports (1:n relation). The port API supports functions to open and write to source ports and functions to open and read from destination ports. Service calls operating on sampling ports never block the caller. Figure 5: Sampling Port Principle Service Access Point (SAP) Ports While ARINC-653 defines two different port types, a third type exists for AFDX, the Service Access Point (SAP) port. In principle, this port type is defined to be a Queuing Port which makes additional parameters available to the API. The requirement for such a SAP port is the ability to communicate with a legacy TCP/IP based network (Compliant Network). Such communication is used for file transfers to file servers or to update an avionic system with new software. In order to communicate with a Compliant Network, a transmitting ES has the ability to specify the destination address: IP address and port number. For this purpose, these addresses are made available when the ES receives a request from the compliant network. 4 Figure 4: Queuing Port Principle The exact API for the SAP port is not specified in the standard; it is however appropriate to use a subset of the well known Berkley UNIX Socket API.
5 Figure 6: Virtual Link topology The Virtual Link Concept One of the most desirable features of an ARINC-429 connection was the fact that it represented a private line between sender and recipient(s) of data. The physical bandwidth of the connection was available at all times, and no concurrent transmit requests occurred. This degree of separation is mandatory when interconnecting avionic systems with different levels of criticality. The AFDX technology achieves this separation by introducing the concept of Virtual Links (VL). Each logical connection is represented by a Virtual Link, thus providing the same properties as a legacy ARINC-429 connection: a unidirectional private line with bounded latency and guaranteed bandwidth. The identification of a given VL is accomplished by using 16 Bit of the 48 Bit MAC address as VL id. Since the IEEE standard allows multicast packet transmission on the Ethernet it is possible to use the standard mechanism to allow a packet to be routed to multiple destination nodes. One of the properties of AFDX however is the fact that a VL may have one and only one End System sending into it. The bandwidth control is achieved by the timing constraints associated to each VL. The mapping of the VL into the global switched network realizes a partitioning of the topology; each VL has an associated time fragmentation called BAG (Bandwidth Allocation Gap) and a maximum frame size. The BAG associated to each VL is the precise time unit between two consecutive IP frames sent by the End System. A VL may not use all the bandwidth, i.e. the time between two consecutive packets may be larger than BAG. However, it may not be smaller than BAG and it is the responsibility of the End System to enforce this. The ARINC-664 specification allows for BAG values in the range of 1 128ms in units of 2n (BAG = 2n, n = {0 7}). The following graphic illustrates the effects of the traffic regulation for a single virtual link. No frame will be transmitted while a VL is eligible but has no data for transmission. When outbound packet streams from multiple VLs are merged for transmission, it is possible that more than one VL has a packet ready and eligible for transmission, due to equal or multiple BAG values. This is a legal case and the packet scheduler needs to serialize the packets, thus introducing a queuing delay (jitter) to the BAG. Figure 9: Unregulated BAG flow before scheduling Figure 10: Regulated BAG flow (single VL) Figure 11: Model of the Scheduled Flow Control Mechanism Figure 7: The BAG in a VL for a maximum bandwidth data flow Figure 8: The BAG in a VL for a non maximum bandwidth data flow At the output of the scheduler, for a given Virtual Link, frames can appear in a bounded time interval. This interval is defined as the maximum admissible jitter. This jitter is introduced by the scheduler and not by the traffic flow itself. The VLs with the same BAG are therefore aggregated into fixed time slots, which guarantee the maximum jitter of the transmission. Transmit Scheduling It is the responsibility of the End System to regulate all outbound traffic according to the allocated time budgets of each virtual link. Therefore transmission for a given VL is blocked until the BAG has elapsed. SNMP and ICMP Every AFDX End System is part of a larger scale aircraft data network, which has a number of functional requirements, safety related requirements, and availability requirements to fulfill. Such a network must be managed to detect and isolate faulty components 5
6 Whitepaper AFDX/ARINC 664 Concept, Design, Implementation and Beyond quickly. The Simple Network Management Protocol (SNMP) has been developed as common network standard to manage large networks and its components. SNMP is based on the manager/agent model consisting of a manager, an agent, a database of management information, managed objects and the network protocol. The manager provides the interface between the human network manager and the management system. The agent provides the interface between the manager and the physical device(s) being managed. Figure 12: SNMP is based on the manager/agent model of a network management architecture. The manager and agent use a Management Information Base (MIB) and a relatively small set of commands to exchange information. The MIB is organized in a tree structure with individual variables, such as point status or description, being represented as leaves on the branches. A long numeric tag or object identifier (OID) is used to distinguish each variable uniquely in the MIB and in SNMP messages. SNMP uses five basic messages (GET, GET-NEXT, GET-RESPONSE, SET, and TRAP) to communicate between the manager and the agent. The GET and GET-NEXT messages allow the manager to request information for a specific variable. The agent, upon receiving a GET or GET-NEXT message, will issue a GET-RESPONSE message to the manager with either the information requested or an error indication as to why the request cannot be processed. A SET message allows the manager to request a change be made to the value of a specific variable in the case of an alarm remote that will operate a relay. The agent will then respond with a GET-RESPONSE message indicating the change has been made or an error indication as to why the change cannot be made. The TRAP message allows the agent to spontaneously inform the manager of an important event. The small number of commands used is only one of the reasons SNMP is simple. The other simplifying factor is its reliance on an unsupervised or connectionless communication link. This simplicity has led directly to its widespread use, specifically in the Internet Network Management Framework. Within this framework, it is considered robust because of the independence of the managers from the agents, e.g. if an agent fails, the manager will continue to function, or vice versa. Implementing AFDX The AFDX technology has successfully been deployed in the Airbus A380 program; the fact that newer programs like A400M or Boeings 787 Dreamliner are following this path shows that this technology will emerge into subsequent aircraft development programs. In principle there are two ways to construct a general purpose End System for AFDX: On the A380 all End Systems are built around ASIC technology, which means that the AFDX protocol has been implemented as hardware, using programmable logic devices. Such an approach inherently has higher performance capabilities and can be easier to certify. On the other hand, the two main technology integrators Airbus and Boeing have already created significant deviations from the ARINC-664 standard and certain flexibility is required to accommodate to these differences. An alternate method to build an AFDX End System is to use an embedded CPU and design the necessary hardware around it, i.e. memory, two Ethernet controllers, communication interface to avionic. In this case the complete AFDX protocol stack runs as firmware on the embedded CPU. In general, it is necessary to have the AFDX protocol implemented on a separate hardware to offload the main CPU from the timing and performance requirements of the AFDX protocol. The host CPU has real-time requirements allocated to it, and therefore the effects of network traffic must be decoupled from it. However, there may be LRU designs which have only little AFDX performance requirements. For such systems, it is feasible to implement the software stack and the application software on a single CPU. Such design freedom already shows the main advantage of a software implementation of the AFDX protocol: the flexibility in design is outstanding compared to a hardware implementation. It has been mentioned that the standard already faces deviations introduced from real-world implementations and further performance requirements and/or technology changes will certainly lead to changes (or enhancements) in the protocol. The desire to use Gigabit Ethernet for instance is a good example. It is inherently easier to make changes to software than to change a hardware design. A software implementation on a separate CPU includes the agents for ICMP and SNMP; a clear advantage over a hardware implementation where these handlers would be in responsibility of the host CPU (and use a certain percentage of the CPU time budget). Figure 13: SYSGO AFDX solution architecture 6
7 Glossary AFDX APEX ARINC ASIC End System BAG Frame IMA MAC SAP Skew SN SNMP ICMP VL Avionics Full Duplex Switched Ethernet. Application Executive, as specified in [ARINC653]. Aeronautical Radio Incorporation. Application-specific integrated circuit. An integrated circuit (IC) customized for a particular use, rather than intended for general-purpose use. An active AFDX client, connected to an AFDX Network to communicate with other clients respecting AFDX rules is called an End-System. It is the subsystem part which must be embedded in each avionics equipment, connected to the AFDX network to communicate with the other AFDX clients. Bandwidth Allocation Gap: minimal gap between sending time of two consecutive frames for a VL. The AFDX protocol is based on the IEEE frame principle: this is the minimum information unit transferred in an AFDX link, including protocol encapsulation information. Integrated Modular Avionics. Medium Access Control. Service Access Point: this is a particular AFDX Port for low-level applications, for frame transmission instead of highest level messages. Time difference in the arrival of redundant frame copies for both networks. Sequence Number: this a byte added to the AFDX frame payload to manage the redundancy. Simple Network Management Protocol Internet Control Message Protocol. One of the core protocols of the Internet protocol suite. It is mainly used by networked computers operating systems to send error messages indicating, for instance, that a requested service is not available or that a host or router could not be reached. Virtual Link: the communication channels used to transfer user s data from an End-System to one or more End Systems, across the switched AFDX network. WP_AFD_10_A4_R by SYSGO AG. All rights reserved. SYSGO, ELinOS, PikeOS, CODEO, COGNITO, and other SYSGO products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SYSGO AG in Germany and in several other countries all over the world. All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. National product specifications may vary. These materials are subject to change without notice. These materials are provided by SYSGO AG for informational purposes only, without representation or warranty of any kind, and SYSGO AG shall not be liable for errors or omissions with respect to the materials. The only warranties for SYSGO AG products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. SYSGO AG Am Pfaffenstein 14 D Klein-Winternheim Phone Fax
Jean Parrend 1/6 SNMP. Content. 1. Introduction...1
Jean Parrend 1/6 SNMP Content 1. Introduction...1 2. SNMP architecture 1 3. The Management Information Base...3 4. Packet types and structure..4 5. Layered communication...5 Traversing the layers 6. References.6
AFDX / ARINC 664. Tutorial
AFDX / ARINC 664 Tutorial 700008_TUT-AFDX-EN_1000 29/08/2008 Imprint Document Title AFDX / ARINC 664 Tutorial Document ID 700008_TUT-AFDX-EN_1000 Issue 1000 Classification Public Project AFDX / ARINC 664
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
White Paper Abstract Disclaimer
White Paper Synopsis of the Data Streaming Logical Specification (Phase I) Based on: RapidIO Specification Part X: Data Streaming Logical Specification Rev. 1.2, 08/2004 Abstract The Data Streaming specification
AFDX networks. Computers and Real-Time Group, University of Cantabria
AFDX networks By: J. Javier Gutiérrez ([email protected]) Computers and Real-Time Group, University of Cantabria ArtistDesign Workshop on Real-Time System Models for Schedulability Analysis Santander,
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
Mixed-Criticality Systems Based on Time- Triggered Ethernet with Multiple Ring Topologies. University of Siegen Mohammed Abuteir, Roman Obermaisser
Mixed-Criticality s Based on Time- Triggered Ethernet with Multiple Ring Topologies University of Siegen Mohammed Abuteir, Roman Obermaisser Mixed-Criticality s Need for mixed-criticality systems due to
AFDX Emulator for an ARINC-based Training Platform. Jesús Fernández Héctor Pérez J. Javier Gutiérrez Michael González Harbour
AFDX Emulator for an ARINC-based Training Platform Jesús Fernández Héctor Pérez J. Javier Gutiérrez Michael González Harbour 2 2 Motivation Mature standards for safety-critical applications ARINC-653 for
Protocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
Communication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
Ethernet A Survey on its Fields of Application
Ethernet A Survey on its Fields of Application Fachtagung ITG FA 5.2 "Zukunft der Netze" Jörg Sommer et al. [email protected] 7. Oktober 2010 Universität Stuttgart Institut für Kommunikationsnetze
Boeing B-777. 29.1 Introduction. 29.2 Background. Michael J. Morgan
29 Boeing B-777 Michael J. Morgan Honeywell 29.1 Introduction 29.2 Background 29.3 Boeing 777 Airplane Information Management System (AIMS) 29.4 Cabinet Architecture Overview 29.5 Backplane Bus 29.6 Maintenance
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
Layer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
Redundancy in enterprise storage networks using dual-domain SAS configurations
Redundancy in enterprise storage networks using dual-domain SAS configurations technology brief Abstract... 2 Introduction... 2 Why dual-domain SAS is important... 2 Single SAS domain... 3 Dual-domain
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
Service Definition. Internet Service. Introduction. Product Overview. Service Specification
Service Definition Introduction This Service Definition describes Nexium s from the customer s perspective. In this document the product is described in terms of an overview, service specification, service
Leased Line + Remote Dial-in connectivity
Leased Line + Remote Dial-in connectivity Client: One of the TELCO offices in a Southern state. The customer wanted to establish WAN Connectivity between central location and 10 remote locations. The customer
From Fieldbus to toreal Time Ethernet
Process Automation From Fieldbus to toreal Time Ethernet Safety, reliability IEC61158-2 as the physical layer too slow for Ethernet/IP frames Unsafe cables towards wireless solutions Factory automation
Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
IP SAN Best Practices
IP SAN Best Practices A Dell Technical White Paper PowerVault MD3200i Storage Arrays THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.
Module 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
PCI Express Overview. And, by the way, they need to do it in less time.
PCI Express Overview Introduction This paper is intended to introduce design engineers, system architects and business managers to the PCI Express protocol and how this interconnect technology fits into
Objectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir [email protected].
What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir [email protected] CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms
Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
Computer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
Per-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
Fibre Channel over Ethernet in the Data Center: An Introduction
Fibre Channel over Ethernet in the Data Center: An Introduction Introduction Fibre Channel over Ethernet (FCoE) is a newly proposed standard that is being developed by INCITS T11. The FCoE protocol specification
VOICE OVER IP AND NETWORK CONVERGENCE
POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it
FOUNDATION Fieldbus High Speed Ethernet Control System
FOUNDATION Fieldbus High Speed Ethernet Control System Sean J. Vincent Fieldbus Inc. Austin, TX, USA KEYWORDS Fieldbus, High Speed Ethernet, H1, ABSTRACT FOUNDATION fieldbus is described in part by the
QoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
hp ProLiant network adapter teaming
hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2
Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2
Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Network Programming TDC 561
Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating
How To Design A Layered Network In A Computer Network
A Layered Approach to Computer Networks Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Different layer of abstraction Different error control
Chapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
Chapter 14: Distributed Operating Systems
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
The OSI Model: Understanding the Seven Layers of Computer Networks
Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer
Industrial Communication Whitepaper. Principles of EtherNet/IP Communication
Industrial Communication Whitepaper Principles of EtherNet/IP Communication 1 Contents Introduction...3 Producer/Consumer Model...4 EtherNet/IP Messaging Types...7 Real Time Data Exchanges...9 Typical
Chapter 16: Distributed Operating Systems
Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology
Chapter 1 Reading Organizer
Chapter 1 Reading Organizer After completion of this chapter, you should be able to: Describe convergence of data, voice and video in the context of switched networks Describe a switched network in a small
VMWARE WHITE PAPER 1
1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the
White paper. Reliable and Scalable TETRA networks
Abstract The evolution of TETRA networks towards an all- IP architecture is now a reality and has been accepted by even the most demanding users of TETRA technology. Although circuit switch based TETRA
Generic term for using the Ethernet standard in automation / industrial applications
Seite 24 Industrial Ethernet Generic term for using the Ethernet standard in automation / industrial applications Specific Quality of Service requirements Real-time Cycle time (e.g. < 1 ms for motion control
The Advantages of Multi-Port Network Adapters in an SWsoft Virtual Environment
The Advantages of Multi-Port Network Adapters in an SWsoft Virtual Environment Introduction... 2 Virtualization addresses key challenges facing IT today... 2 Introducing Virtuozzo... 2 A virtualized environment
Introduction To Computer Networking
Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.
Three Key Design Considerations of IP Video Surveillance Systems
Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All
MLPPP Deployment Using the PA-MC-T3-EC and PA-MC-2T3-EC
MLPPP Deployment Using the PA-MC-T3-EC and PA-MC-2T3-EC Overview Summary The new enhanced-capability port adapters are targeted to replace the following Cisco port adapters: 1-port T3 Serial Port Adapter
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
Maximizing Server Storage Performance with PCI Express and Serial Attached SCSI. Article for InfoStor November 2003 Paul Griffith Adaptec, Inc.
Filename: SAS - PCI Express Bandwidth - Infostor v5.doc Maximizing Server Storage Performance with PCI Express and Serial Attached SCSI Article for InfoStor November 2003 Paul Griffith Adaptec, Inc. Server
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Requirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
Overview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
REMOTE MONITORING MATRIX
802.1ag/Y.1731 BASIC ADVANCED 802.3ah Link 802.1ag/Y.1731 RFC 2544 REMOTE MONITORING MATRIX Featuring a matrix of different features that will help you identify and select which Transition products best
Process Control and Automation using Modbus Protocol
Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has
High Speed I/O Server Computing with InfiniBand
High Speed I/O Server Computing with InfiniBand José Luís Gonçalves Dep. Informática, Universidade do Minho 4710-057 Braga, Portugal [email protected] Abstract: High-speed server computing heavily relies on
Data Link Protocols. TCP/IP Suite and OSI Reference Model
Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite
Intel Ethernet Switch Converged Enhanced Ethernet (CEE) and Datacenter Bridging (DCB) Using Intel Ethernet Switch Family Switches
Intel Ethernet Switch Converged Enhanced Ethernet (CEE) and Datacenter Bridging (DCB) Using Intel Ethernet Switch Family Switches February, 2009 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION
White Paper. Requirements of Network Virtualization
White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
The proliferation of the raw processing
TECHNOLOGY CONNECTED Advances with System Area Network Speeds Data Transfer between Servers with A new network switch technology is targeted to answer the phenomenal demands on intercommunication transfer
This topic lists the key mechanisms use to implement QoS in an IP network.
IP QoS Mechanisms QoS Mechanisms This topic lists the key mechanisms use to implement QoS in an IP network. QoS Mechanisms Classification: Each class-oriented QoS mechanism has to support some type of
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps
Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
Improving Quality of Service
Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic
Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
Technical Solution & White Paper. AFDX/ARINC664 End System Testing JS, AIM GmbH 9.7.2012
Technical Solution & White Paper AFDX/ARINC664 End System Testing JS, AIM GmbH 9.7.2012 Page 1 General Following Paper outlines the AIM approach for testing AFDX/ARINC664 End Systems against the ARINC664
WHITE PAPER. Enabling 100 Gigabit Ethernet Implementing PCS Lanes
WHITE PAPER Enabling 100 Gigabit Ethernet Implementing PCS Lanes www.ixiacom.com 915-0909-01 Rev. C, January 2014 2 Table of Contents Introduction... 4 The IEEE 802.3 Protocol Stack... 4 PCS Layer Functions...
The OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
Network Monitoring White Paper
Network ing White Paper ImageStream Internet Solutions, Inc. 7900 East 8th Road Plymouth, Indiana 46563 http://www.imagestream.com [email protected] Phone: 574.935.8484 Sales: 800.813.5123 Fax: 574.935.8488
Remote Serial over IP Introduction on serial connections via IP/Ethernet
Remote Serial over IP Introduction on serial connections via IP/Ethernet TABLE OF CONTENT TABLE OF CONTENT... I TABLE OF IMAGES... I INTRODUCTION... 1 Classic Style of Communication... 1 Ethernet and
CORPORATE NETWORKING
CORPORATE NETWORKING C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham [email protected] Typical example of Ethernet local networks Mostly based
Using & Offering Wholesale Ethernet Network and Operational Considerations
White Paper Using and Offering Wholesale Ethernet Using & Offering Wholesale Ethernet Network and Operational Considerations Introduction Business services customers are continuing to migrate to Carrier
Virtual KNX/EIB devices in IP networks
WEINZIERL ENGINEERING GmbH WEINZIERL ENGINEERING GMBH F. Heiny, Dr. Y. Kyselytsya, Dr. Th. Weinzierl Bahnhofstr. 6 D-84558 Tyrlaching Tel. +49 (0) 8623 / 987 98-03 E-Mail: [email protected] Web: www.weinzierl.de
PROFINET the Industrial Ethernet standard. Siemens AG 2013. Alle Rechte vorbehalten.
the Industrial Ethernet standard is 100% Ethernet is Ethernet Ethernet is the established standard in the IT world for fast exchange of data (IEEE 802.3) is always full duplex simultaneous communication
Application Note Gigabit Ethernet Port Modes
Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Table of Contents Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 7
Security Overview of the Integrity Virtual Machines Architecture
Security Overview of the Integrity Virtual Machines Architecture Introduction... 2 Integrity Virtual Machines Architecture... 2 Virtual Machine Host System... 2 Virtual Machine Control... 2 Scheduling
From Ethernet Ubiquity to Ethernet Convergence: The Emergence of the Converged Network Interface Controller
White Paper From Ethernet Ubiquity to Ethernet Convergence: The Emergence of the Converged Network Interface Controller The focus of this paper is on the emergence of the converged network interface controller
QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
Virtualization: TCP/IP Performance Management in a Virtualized Environment Orlando Share Session 9308
Virtualization: TCP/IP Performance Management in a Virtualized Environment Orlando Share Session 9308 Laura Knapp WW Business Consultant [email protected] Applied Expert Systems, Inc. 2011 1 Background
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
Monitoring Traffic manager
Monitoring Traffic manager eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
Avaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
10/100/1000 Ethernet MAC with Protocol Acceleration MAC-NET Core
1 Introduction The implements, in conjunction with a triple speed 10/100/1000 MAC, Layer 3 network acceleration functions, which are designed to accelerate the processing of various common networking protocols
HP network adapter teaming: load balancing in ProLiant servers running Microsoft Windows operating systems
HP network adapter teaming: load balancing in ProLiant servers running Microsoft Windows operating systems white paper Introduction... 2 Overview of teaming and load balancing... 2 Transmit Load Balancing...
Lustre Networking BY PETER J. BRAAM
Lustre Networking BY PETER J. BRAAM A WHITE PAPER FROM CLUSTER FILE SYSTEMS, INC. APRIL 2007 Audience Architects of HPC clusters Abstract This paper provides architects of HPC clusters with information
ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW
PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW By Thierno Diallo, Product Specialist Originally designed as a local-area network (LAN) communication protocol,
ADVANCED NETWORK CONFIGURATION GUIDE
White Paper ADVANCED NETWORK CONFIGURATION GUIDE CONTENTS Introduction 1 Terminology 1 VLAN configuration 2 NIC Bonding configuration 3 Jumbo frame configuration 4 Other I/O high availability options 4
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
